Lab 7 - Info Sec

Satisfactory Essays
Topics: Attack
Overview:
Anytime a user attempts to access a network, the server logs the attempt. In this lab, you first used the
Windows Event Viewer utility to search for failed logon attempts, which could indicate a possible intrusion by an unauthorized user. You also generated your own errors by attacking the Windows 2008 server and then reviewed the Internet Information Services (IIS) logs to find those errors. Finally, you documented your findings and recommended remediation steps.
Lab Assessment Questions & Answers: 1. What services were attacked on the IIS server? 2. How many failed logons were detected?
3. Specify the date/timestamps when monitoring started and when the attacks occurred. 4. What options are available to prevent brute force authentication attacks in a Windows-based domain? 5. What is an insider attack? 6. If the attacks for this lab were coming from an internal IP, would you allow the attack to continue to investigate further or stop the attack? 7. With the information provided in this lab, what steps would you take to prevent a reoccurrence of an external attack?
8. What is a best practice to deter insiders from even thinking about executing an attack?
Overview:
Anytime a user attempts to access a network, the server logs the attempt. In this lab, you first used the
Windows Event Viewer utility to search for failed logon attempts, which could indicate a possible intrusion by an unauthorized user. You also generated your own errors by attacking the Windows 2008 server and then reviewed the Internet Information Services (IIS) logs to find those errors. Finally, you documented your findings and recommended remediation steps.
Lab Assessment Questions & Answers: 1. What services were attacked on the IIS server? 2. How many failed logons were detected?
3. Specify the date/timestamps when monitoring started and when the attacks occurred. 4. What options are available to prevent brute force authentication attacks in a

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab Report Info

    • 327 Words
    • 2 Pages

    Lab Report Procedure 6.1: Perform Benedict’s test for reducing sugars. Introduction: Benedict’s tests allows for the detection of the presence of reducing sugars. All monosaccharides are reducing sugars since all of them have active carbonyl group. Some disaccharides that are exposed to a carbonyl group are also reducing sugars but less reactive than monosaccharides. By mixing the sugar solution with Benedict’s solution and heating them, a redox reaction will occur. The copper (II) sulphate…

    • 327 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 995 Words
    • 4 Pages

    Lab 7: Geologic Time 9 Answer Sheet Name(s) 1. As an example of how radioactive decay works, the TA may lead a small demonstration. Each student will receive one penny and stand up. At this point all of the students are parent isotopes. Every student should then flip their penny. Students whose penny lands heads-up should sit down. These students who are now seated are now daughter isotopes. The remaining standing students should again flip their penny, and students whose penny lands heads-up…

    • 995 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The Sec

    • 1022 Words
    • 5 Pages

    accounting standards in use through out the world in the next five years? The SEC (Securities and Exchange Commission) which oversees the accounting practices of publicly traded corporations. Is currently implementing plans for the convergence of GAAP into the IFRS as the standard for the U.S. and the world. Currently 110 developed, mid level, and developing countries use the IFRS as their accounting standard. The SEC has stated that they would like to converge to the IFRS by the end of 2014 but…

    • 1022 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    LAB 7

    • 354 Words
    • 2 Pages

    How much available shrink space is contained in the volume? 449MB 6. How is the last volume you created different from the previous ones? Explain why. The size of the volume is different. By shrinking the file it made the volumes less than 2000MB 7. What do you suppose would happen if you created another simple volume out of the free space left on the disk? I think that the it will run out of recourse. 8. Were you successful? No, The extend option is grayed out. 9. What is the result? It was…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    1. What are some common risks, threats, and vulnerabilities commonly found in the LAN-to-WAN Domain that must be mitigated through a layered security strategy? A layered security strategy will encompass Rouge protocols such as Bit mining and P2P, Unauthorized network scanning and probing, and unauthorized access to the network. 2. What is an Access Control List (ACL) and how is it useful in a layered security strategy? An ACL is a Control list which will allow or deny traffic or devices based on…

    • 928 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Lab 7

    • 1276 Words
    • 9 Pages

    Introduction to Networking GRADED ASSIGNMENTS Unit 9 Research 1: Network Design, Part 1 Course Objectives and Learning Outcomes Show competency in all outcomes for this course. Assignment Requirements Now it is time for you to put your networking knowledge to work. Read through the Network Design: Kamazon.kom Network Upgrade information and make sure you understand the customer’s requirements. Your instructor will act as Kamazon’s representative, so if you have questions or need clarification…

    • 1276 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 7 Student

    • 1242 Words
    • 7 Pages

    Lab 7: Repetition Structures I This lab accompanies Chapter 5 (pp. 163-183 and pp. 196-201) of Starting Out with Programming Logic & Design. Name: ___________________________ Lab 7.1 –Condition Controlled with While and Do-While Loops: Pseudocode Critical Review A repetition structure causes a statement or set of statements to execute repeatedly. Repetition structures are used to perform the same task over and over. Repetition structures are commonly called loops A condition-controlled…

    • 1242 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Lab 7

    • 346 Words
    • 2 Pages

    Chapter 7 Lab 7.1.1 Why is it impractical for an organization to own the entirety of a WAN? There are no limitations on WANs so they can be custom built for the size of the organization. Why is it favorable for an organization to maintain ownership of the entirety of the LAN? Because the purpose of organizational expansion. Table 7-1 WAN Physical Media Media Infrastructure Summary UTP Phone lines The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The cable…

    • 346 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT220 Lab 7

    • 303 Words
    • 2 Pages

    Frantzy Senat IT220 Lab 7 Lab 7.1 Exercise 7.1.1 Its impractical for whole organization to own a whole WAN because it could be great distances or overseas or across the country. It would be better to own the LAN to be able to control the cost of the set up Exercise 7.1.2 Increasing the distance would help due to making easier to…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3445 Lab 7

    • 371 Words
    • 2 Pages

    Lab 7 IS3445 Security Strategies for Web Applications and Social Networking Lab 7 Assessment 1. How does Skipfish categorize findings in the scan report? As high risk flaws, medium risk flaws, and low issue scans 2. Which tool used in the lab is considered a static analysis tool? Explain what is referred to by static code analysis. RATS, because the running of static code analysis tools that attempt to highlight possible vulnerabilities within ‘static’ (non-running) source code. 3. What possible…

    • 371 Words
    • 2 Pages
    Satisfactory Essays